CN108881253B - Block chain real name participation method and system - Google Patents
Block chain real name participation method and system Download PDFInfo
- Publication number
- CN108881253B CN108881253B CN201810692342.2A CN201810692342A CN108881253B CN 108881253 B CN108881253 B CN 108881253B CN 201810692342 A CN201810692342 A CN 201810692342A CN 108881253 B CN108881253 B CN 108881253B
- Authority
- CN
- China
- Prior art keywords
- user
- authentication
- time
- block chain
- broadcast message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000005065 mining Methods 0.000 claims abstract description 60
- 238000012795 verification Methods 0.000 claims description 17
- 238000004590 computer program Methods 0.000 claims description 9
- 238000013475 authorization Methods 0.000 claims description 8
- 238000004364 calculation method Methods 0.000 claims description 6
- 239000012634 fragment Substances 0.000 claims description 3
- 238000012423 maintenance Methods 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 230000006399 behavior Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000005406 washing Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a method and a system for participating in real names of block chains, wherein the method comprises the following steps: the participating nodes perform preliminary authentication according to the authentication video; after the preliminary authentication is passed, the mining node verifies whether a user certificate image is matched with a living user, if so, verifies whether user certificate information is matched with user basic information, wherein the user certificate image and the user certificate information are authenticated by the acquired public security bureau, if so, time difference between video recording time and receiving time is calculated, if the time difference meets a preset time range, the application user real name authentication is determined to be passed, and if no invalid broadcast message is received, the block is written into a block chain account book. Therefore, real-name authentication of the nodes in the block chain is realized based on the user related information provided by the public security bureau, the accuracy of the real-name authentication is ensured, the nodes in the block chain network correspond to the real user identities in real life, and the management of the nodes and the maintenance of the validity of the block chain are facilitated.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and a system for participating in a block chain real name.
Background
Generally, the blockchain technology is widely used because trust cost is reduced by ensuring security of transactions based on information interaction between nodes.
At present, participation modes in a blockchain network are anonymous, and only all blockchain behaviors can be proved to be implemented by a user corresponding to a certain node but cannot be forged by other users, that is, an implementation environment of the blockchain network is separated from real life, and it is difficult to manage the user corresponding to the node in real life, for example, once there is illegal behaviors such as washing black money in the blockchain network, the network identity can only be proved but the real identity cannot be proved even if a certificate issued by a national CA (certificate authority) authority, and the CA authority needs to participate offline if the real identity is to be proved, which is very complex. Therefore, a method for effectively determining real user identities in real life corresponding to nodes in a blockchain network is needed.
Disclosure of Invention
The invention provides a method and a system for participating in real names of block chains, which aim to solve the technical problems that the nodes of the block chains cannot be effectively managed and the legality of the block chains cannot be maintained in the prior art.
A first embodiment of the present invention provides a method for participating in a block chain real name, including: the participating node reads a user certificate image and user certificate information signed by a private key of a public security bureau from a certificate chip of an application user through authorization equipment, and acquires an authentication video recorded by the application user, wherein the authentication video comprises: the living body user and the video recording time are recorded, the authentication video is subjected to Hash calculation to obtain a corresponding Hash value, and the Hash value is sent to a timestamp server; the timestamp server records the receiving time of the hash value, applies a private key of the timestamp server to sign the hash value and the receiving time and sends the signed hash value and the receiving time to the participating node; the participating node calculates the time difference between the video recording time and the receiving time, and if the time difference is found to meet a preset time range, the participating node applies a private key of the application user to sign an authentication broadcast message and then sends the authentication broadcast message to a block chain network, wherein the authentication broadcast message comprises the authentication broadcast message; the hash value and the receiving time signed by the private key of the timestamp server, the public key and the basic user information of the application user, the user certificate image and the user certificate information signed by the private key of the public security bureau and the authentication video; the mining node applies the public key of the application user to carry out signature verification on the received authentication broadcast message, verifies whether the hash value is matched with the authentication video after the verification is passed, if the correct matching is obtained, verifies whether the user certificate image is matched with the living body user, if the correct matching is obtained, verifies whether the user certificate information is matched with the user basic information, if the correct matching is obtained, the time difference between the video recording time and the receiving time is calculated, if the time difference meets the preset time range after the comparison is obtained, the real-name authentication of the application user is determined to pass, and the authentication success message is written into a block and is broadcasted to the block chain network; and the mining node judges whether invalid broadcast messages which are sent by other mining nodes and indicate the block are received within preset time, if the invalid broadcast messages are not received, the block is broadcasted to the block chain network to be effective, and the block is written into a block chain account book.
A second embodiment of the present invention provides a block chain real-name authentication system, including: the system comprises a participating node, a timestamp server and a mining node, wherein the participating node is used for reading a user certificate image and user certificate information which are signed by a private key of a public security bureau from a certificate chip of an application user through authorization equipment and acquiring an authentication video recorded by the application user, wherein the authentication video comprises: the live body user and the video recording time are used, hash calculation is carried out on the authentication video to obtain a corresponding hash value, and the hash value is sent to the timestamp server; the timestamp server is used for recording the receiving time of the hash value, applying a private key of the timestamp server to sign the hash value and the receiving time and sending the signed hash value and the receiving time to the participating node; the participating node is used for calculating the time difference between the video recording time and the receiving time, and if the time difference is found to meet a preset time range, applying a private key of the application user to sign an authentication broadcast message and then sending the authentication broadcast message to a block chain network, wherein the authentication broadcast message comprises the authentication broadcast message; the hash value and the receiving time signed by the private key of the timestamp server, the public key and the basic user information of the application user, the user certificate image and the user certificate information signed by the private key of the public security bureau and the authentication video; the mining node is used for performing signature verification on the received authentication broadcast message by using the public key of the application user, verifying whether the hash value is matched with the authentication video after the verification is passed, verifying whether the user certificate image is matched with the living user if correct matching is obtained, verifying whether the user certificate information is matched with the user basic information if correct matching is obtained, calculating the time difference between the video recording time and the receiving time if correct matching is obtained, determining that the real-name authentication of the application user passes if the time difference meets a preset time range after the comparison is obtained, writing the authentication success message into a block, and broadcasting the block chain network; and the mining node is used for judging whether invalid broadcast messages which are sent by other mining nodes and indicate the block are received within preset time, if the invalid broadcast messages are not received, the block is broadcasted to the block chain network to be effective, and the block is written into a block chain account book.
A third embodiment of the present invention provides a computer apparatus including: the present invention relates to a block chain real-name participation method, and more particularly, to a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor executes the computer program to implement the block chain real-name participation method according to the above embodiments.
A fourth embodiment of the present invention provides a non-transitory computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the blockchain real-name participation method as described in the above embodiments.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
the real-name authentication of the nodes in the block chain is realized based on the user related information provided by the public security bureau, the accuracy and the reliability of the real-name authentication are ensured, the nodes in the block chain network correspond to the real user identities in real life, and the management of the nodes and the maintenance of the validity of the block chain are facilitated.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which,
FIG. 1 is a block chain real name participation system according to an embodiment of the present invention;
FIG. 2 is an interaction diagram of a blockchain real name participation system in accordance with one embodiment of the present invention;
FIG. 3 is an interaction diagram of a blockchain real-name participation system according to another embodiment of the present invention;
FIG. 4 is a flow diagram of a blockchain real name participation method according to one embodiment of the invention;
fig. 5 is a flowchart of a blockchain real name participation method according to another embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
Based on the description of the background art, it is understood that, in the prior art, since participation modes of participating nodes in a blockchain network are anonymous, the blockchain-based network can only confirm network identities of the participating nodes, but cannot determine the real identities of operation users corresponding to the participating nodes in real life, so that the operation of the blockchain network cannot be effectively supervised.
When the development of the block chain technology is rapid, the block chain technology is increasingly applied to bear the property of the physical world, and the anonymity can derive numerous fraudulent behaviors, which restricts the popularization of the block chain technology.
In order to solve the technical problem, the invention provides a block chain real-name participation method, in which participation nodes in a block chain are closely linked with identity information of a user in the real world, so that management of the participation nodes based on the real information of the user and legality guarantee of a block chain network environment are facilitated.
For clarity of description, the blockchain real-name participation system according to an embodiment of the present invention is first described, fig. 1 is a schematic structural diagram of the blockchain real-name participation system according to an embodiment of the present invention, and as shown in fig. 1, the system includes a participation node 100, a mining node 200, and a timestamp server 300, where the participation node 100 is a node that first applies for joining a blockchain network, and after the participation node 100 successfully joins the blockchain network, the participation node serves as the mining node to perform an accounting function, and the timestamp server 300 is used for time-stamping node behaviors in the blockchain network, including transaction behaviors, and the like, so as to prevent the transaction from being forged and the like.
Referring to fig. 2, in an actual execution process, a participating node acquires an authentication video recorded by an application user (step 1), where the application user may be an individual or an enterprise, and the authentication video includes: the method comprises the steps that a living user and video recording time are marked, the uniqueness of an authentication video is marked, the authentication video is subjected to Hash calculation to obtain a corresponding Hash value, and the Hash value is sent to a timestamp server, however, the real-name authentication can be completed when an illegal user uses a fake user certificate to perform identity authentication, so that in order to further guarantee the accuracy of the real-name authentication, a participating node reads a user certificate image and user certificate information which are signed by a private key of a public security bureau from a certificate chip of an application user through authorization equipment (step 2).
And the timestamp server records the receiving time of the received hash value, applies a private key of the timestamp server to sign the hash value and the receiving time and sends the signed hash value and the receiving time to the participating nodes, so that the private key signature is carried out on the authentication video through the timestamp server, and the counterfeiting of the authentication video is avoided (step 3).
The participating node calculates the time difference between the video recording time and the video receiving time, if the time difference is found to meet the preset time range, the authentication video can truly reflect the true information of the application user corresponding to the participating node, and therefore the private key of the application user is applied to sign the authentication broadcast message and then the authentication broadcast message is sent to the block chain network (step 4), wherein the authentication broadcast message comprises the authentication broadcast message; the hash value and the receiving time signed by the private key of the timestamp server, the public key of the application user and the basic information of the application user, and the authentication video.
Further, the mining node applies the public key of the application user to perform signature verification on the received authentication broadcast message so as to prevent other illegal nodes from being disguised as participating nodes to perform identity authentication (step 51).
It should be understood that, in the embodiment of the present invention, identity authentication is performed on an application user corresponding to a participating node of a blockchain based on a public key certificate technology, and a core of the public key certificate technology is a pair of keys, which has the following basic principle: information content encrypted by one key can only be decrypted by another key with which it is paired. The encrypted public key can be widely sent to a correspondent, namely the mining node, and the encrypted private key needs to be stored safely. In use, the participating nodes can encrypt the broadcast information by using the signature private keys of the participating nodes and transmit the encrypted broadcast information to the mining nodes, and the mining nodes can use the encrypted public keys of the participating nodes to complete decryption.
Further, after the verification is passed, whether the hash value is matched with the authentication video is verified (step 52), so that the situation that an illegal user uses other videos to perform real-name authentication is avoided, if correct matching is obtained, whether the user certificate image is matched with a living user is verified (step 53), if correct matching is obtained, whether the user certificate information is matched with the user basic information is verified (step 54), if correct matching is obtained, the user certificate information and the like are valid, further, the time difference between the video recording time and the receiving time is calculated (step 55), if the time difference meets a preset time range after comparison, the fact that the real-name authentication of the user is passed is determined, and an authentication success message is written into a block and is broadcasted to a block chain network (step 56).
In this embodiment, in order to further verify the validity of the participating node and avoid the participating node from damaging the operating environment of the blockchain network, the mining node determines whether to receive an invalid broadcast message of an indication block sent by another mining node within a preset time, that is, whether the participating node joins the blockchain network and normally performs an accounting function is determined, if it is known that the invalid broadcast message is not received, it indicates that the participating node joins the blockchain network and normally performs the accounting function, the block is broadcasted to the blockchain network and validated, and the block is written into a blockchain account book (step 6).
In the actual implementation process, it is possible that other mining nodes have a billing error to misjudge the current participating node billing error, and an invalid broadcast message is sent, so in order to further improve the accuracy of verification when the participating node participates in the blockchain network, in an embodiment of the present invention, as shown in fig. 3, on the basis of the foregoing fig. 2, the following steps are further included: if the fact that the invalid broadcast message is received is known, whether the number of the mining nodes sending the invalid broadcast message exceeds a preset threshold value or not is judged (step 7), for example, whether the number of the mining nodes exceeds half of the number of the mining nodes is judged, if the known number is smaller than the preset threshold value, a block is broadcasted to the block chain network, the block is written into a block chain book, and if the known number is larger than or equal to the preset threshold value, the block is broadcasted to the block chain network inefficiently (step 8).
Therefore, the block chain real-name participation system of the embodiment of the invention performs real-name authentication on the living body user corresponding to the participation node when the participation node applies to join the block chain network, and performs identity authentication based on the user certificate of the common security authentication and the like, thereby further improving the accuracy and reliability of the real-name authentication.
In order to describe the details of the execution of the blockchain real-name participation system according to the embodiment of the present invention in more detail, so that those skilled in the art can make the blockchain real-name participation process of the present invention more clear, the following description focuses on the blockchain real-name participation method side to perform the details of the participation process.
Fig. 4 is a flowchart of a blockchain real name participation method according to an embodiment of the present invention, as shown in fig. 4, the method includes:
The authorization device may be a hardware device authorized by an authority such as a public security bureau, and the hardware device may read a user certificate image and user certificate information stored in the certificate chip.
It can be understood that, in the embodiment of the present invention, the participating node reads the user certificate image and the user certificate information signed by the private key of the public security bureau from the certificate chip of the application user through the authorization device, instead of acquiring the user certificate image and the certificate information uploaded by the application user, thereby avoiding the organic multiplication of the illegal user who holds the fake certificate for registration. The user certificate comprises an identity card, a passport, a student card, a medical insurance card and the like, wherein the identity card comprises a user certificate image and user certificate information.
The video recording time includes a time electronic clock chart displaying a current specific time, for example, an electronic clock chart displaying a current year, month, day, hour, minute and second, or a current specific time read by a living user, that is, the current specific time is represented in a form of voice, and the video recording time is used for indicating a specific time for a user to record a video, so as to avoid that an authentication video uploaded by the user is recorded at a longer time and greatly differs from the real facial information of the user (for example, an application user aged 26 uploads an authentication video recorded at the age of 18).
Specifically, in order to implement real-name authentication of a participating node application user, the user needs to record a section of authentication video in advance, where the authentication video includes a living user (i.e., a real application user, rather than an image such as a humanoid branding) and a video recording time, and further, the participating node acquires the authentication video recorded by the application user, where the participating node may acquire the authentication video in a manner of actively uploading by the user, or may actively extract the participating node from a related device after the user records the authentication video using a device corresponding to the participating node, such as a smart phone.
And further, the participating node calculates the hash value of the authentication video, marks the uniqueness of the authentication video through the hash value, and sends the hash value to the timestamp server, so as to further acquire a reliable time signature sent by the timestamp server.
And 102, recording the receiving time of the received hash value by the timestamp server, applying a private key of the timestamp server to sign the hash value and the receiving time, and sending the signed hash value and the receiving time to the participating nodes.
Specifically, the timestamp server records the receiving time of the received hash value, signs the hash value and the receiving time with a private key of the timestamp server, and sends the signed hash value and the receiving time to the participating node, for example, sends the signed hash value and the receiving time to the participating node through NFC (Near field communication), WiFi, and the like, so that reliable time signing of the authentication video applied by the participating node is realized.
103, calculating a time difference between video recording time and video receiving time by a participating node, and if the time difference is found to meet a preset time range, applying a private key of an application user to sign an authentication broadcast message and then sending the authentication broadcast message to a block chain network, wherein the authentication broadcast message comprises the authentication broadcast message; the hash value and the receiving time signed by the private key of the timestamp server, the public key and the basic information of the user, the image and the information of the user certificate signed by the private key of the public security bureau and the authentication video.
It should be understood that, if the participating node determines that the difference between the receiving time of the hash value received by the timestamp server and the video recording time is large, it may be that the illegal device pretends that the hash value sent by the timestamp server to the participating node is signed and sends the signature to the participating node, so that the difference between the receiving time and the video recording time is large.
Specifically, the time difference between the video recording time and the video receiving time is calculated, for example, the video recording time displayed in a time electronic clock chart displaying the current specific time is extracted, the time difference between the video recording time and the video receiving time is calculated, whether the time difference meets a preset time range is judged, the preset time range is calibrated according to a large amount of experimental data, usually, in the preset time range, a legal participating node can finish successfully uploading the recorded authentication video to a timestamp server, and the timestamp server can finish the feedback of the signature until the participating node receives the signature.
If the time difference meets the preset time range, the signing party of the hash value is the timestamp server, and therefore the private key of the application user signs the authentication broadcast message and then sends the authentication broadcast message to the block chain network, so that the block chain network can perform re-authentication on the legality of the application user according to the authentication broadcast message. Wherein, the private key of the application user is only held by the application user.
The authentication broadcast message comprises a hash value and receiving time from a timestamp server to a private key signature, a public key and user basic information of an application user, an authentication video, a user certificate image and user certificate information which are signed by a common security private key, wherein the user basic information comprises user identity card number and other information for identifying user uniqueness, the user name comprises user name and other information for identifying user identity, and the user basic information corresponds to the user certificate information so as to further perform real-name authentication of the application user according to the user basic information and the user certificate information.
And 104, the mining node applies the public key of the application user to carry out signature verification on the received authentication broadcast message, verifies whether the Hash value is matched with the authentication video after the verification is passed, if the correct matching is obtained, verifies whether the user certificate image is matched with the living user, if the correct matching is obtained, verifies whether the user certificate information is matched with the user basic information, if the correct matching is obtained, the time difference between the video recording time and the receiving time is calculated, if the time difference meets the preset time range after the comparison is obtained, the real-name authentication of the application user is determined to be passed, and the authentication success message is written into the block and is broadcasted to the block chain network.
As described above, the private key of the participating user and the public key of the participating user in the authentication broadcast message are a pair of passwords, so in the embodiment of the present invention, the mining node applies the public key of the applying user to perform the authentication of signing the received authentication broadcast message signed by the private key of the participating user, and when the public key of the applying user corresponds to the private key of the applying user signed in the authentication broadcast message, it indicates that the participating node itself sent the authentication broadcast message, thereby completing the re-verification of the validity of the participating node.
Further, after the verification is passed, whether the hash value is matched with the authentication video is verified, so that the authentication video sent by other participating nodes is prevented from being confused in the real-name authentication process, and if the hash value is correctly matched with the authentication video, the authentication video currently participating in the authentication is determined to be corresponding to the participating node of the corresponding user.
Further, the method comprises the steps of performing real-name authentication on the application user, verifying whether a user certificate image is matched with the living user, namely whether the living user uses the user certificate of the user to authenticate, and if the user certificate image is matched with the user basic information, verifying whether the user certificate information is matched with the user basic information to further ensure that the living user uses the relevant information of the user to perform real-name authentication.
If the certificate information of the user is matched with the basic information of the user, the fact that the living body user uses the relevant information of the user to carry out real-name authentication is indicated, at the moment, the legality verification of the content of the authentication video is completed, and the certificate information of the authenticated user and the certificate image of the user are authenticated by the public security bureau, so that the authentication reliability is guaranteed.
In addition, if the difference between the receiving time of the hash value received by the timestamp server and the video recording time is large, other illegal devices may intercept the hash value sent by the participating node, pretend that the participating node sends the intercepted hash value to the timestamp server, and the like, so that the difference between the receiving time and the video recording time is large. In order to avoid that an illegal user uses the authentication videos of other users to carry out real-name authentication, the time difference between the video recording time and the video receiving time is calculated again, the time difference is obtained through comparison and meets the preset time range, the authentication video is proved to be the authentication video of the corresponding application user sent by the participating node, the real-name authentication of the application user is confirmed to be passed, and the authentication success message is written into the block and is broadcasted to the block chain network.
In different application scenarios, the authentication success message may be an agreed character string indicating success of authentication, or may be specific text information indicating success of authentication, and the like, which is not limited herein.
Considering that in some scenarios, some illegal users may perform real-name authentication by intercepting and replaying authentication videos of other users, so as to further ensure that the authentication video provided by the participating node corresponds to the application user himself, in an embodiment of the present invention, the authentication video further includes a voice segment for reading a preset authentication video by a live user, as shown in fig. 5, before determining that the real-name authentication of the application user passes, the method further includes:
Step 202, if the mining node learns that the lip language content is consistent with the text content of the voice fragment, determining that the real-name authentication of the application user passes.
It can be understood that, in order to avoid being illegally utilized by other users, when an application user records an authentication video, a segment of voice containing personal information of the application user is read, for example, a segment of 'this is a video for which the block chain real name authentication is small and clear' voice, and the like is read, so that the mining node detects the lip language of a living user to acquire the lip language content, compares the lip language content with the text content of a preset voice segment, and determines that the real name authentication of the application user passes if the mining node knows that the lip language content is consistent with the text content of the voice segment. Therefore, on one hand, the legality authentication is carried out based on the lip language, the condition that an illegal user carries out voice dubbing authentication through a received video is avoided, and on the other hand, the condition that even if the illegal user intercepts the authentication video of other users, the living body of the illegal user cannot attack due to the fact that the living body of the illegal user cannot correspond to the intercepted authentication video is guaranteed.
And 105, judging whether invalid broadcast messages of the indication blocks sent by other mining nodes are received within preset time by the mining nodes, if the mining nodes know that the invalid broadcast messages are not received, enabling the broadcast blocks to take effect to the block chain network, and writing the blocks into a block chain account book.
It is understood that after the participating node successfully accesses the blockchain network, the real-name authentication is completed in time, and it is also possible that the user of the real-name authentication is an illegal user, so that in order to ensure that the participating node normally performs accounting activities, rather than illegal activities such as washing black money, it is necessary to verify whether the participating node performs normal and legal accounting activities.
Specifically, the mining node in the blockchain network compares the transaction information and the like recorded in the book with the transaction information of the same transaction recorded by the participating node, if the transaction information and the like are not consistent, the mining node judges that the accounting of the participating node is wrong, judges that a block of the authentication success message corresponding to the participating node is invalid, judges whether broadcast information indicating that the block is invalid and sent by other mining nodes is received within preset time or not, and if the broadcast information indicating that the block is invalid is not received, broadcasts the block to the blockchain network to be effective and writes the block into the blockchain book.
Certainly, in the actual execution process, it is possible that another mining node has a billing error and thus misjudges the current participating node billing error, and sends an invalid broadcast message, so to further improve the accuracy of the verification when the participating node participates in the blockchain network, in an embodiment of the present invention, if the mining node learns that the invalid broadcast message is received, it is determined whether the number of mining nodes sending the invalid broadcast message exceeds a preset threshold, where the preset threshold is related to the total number of mining nodes and the authority of the mining nodes in the blockchain network, and the larger the total number of mining nodes, the lower the authority of the mining nodes (for example, only common participating nodes), the lower the corresponding preset threshold.
If the number of the mining nodes is less than the preset threshold value, the mining nodes indicate that most mining nodes identify the block, or no authoritative mining node considers that the block is invalid, so that the block is broadcasted to the block chain network to be effective and written into the block chain book, otherwise, if the number is greater than or equal to the preset threshold value, the block is broadcasted to the block chain network to be invalid.
In summary, the block chain real-name participation method in the embodiment of the present invention realizes real-name authentication of nodes in a block chain based on user-related information provided by a public security bureau, ensures accuracy and reliability of real-name authentication, and corresponds nodes in a block chain network to real user identities in real life, thereby facilitating management of the nodes and maintaining validity of the block chain.
In order to implement the foregoing embodiments, the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the computer device implements the block chain real name participation method as described in the foregoing embodiments.
In order to implement the foregoing embodiments, the present invention also proposes a non-transitory computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, is capable of implementing the blockchain real-name participation method as described in the foregoing embodiments.
In the present invention, the terms "first", "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the present invention, unless otherwise expressly stated or limited, the first feature "on" or "under" the second feature may be directly contacting the first and second features or indirectly contacting the first and second features through an intermediate. Also, a first feature "on," "over," and "above" a second feature may be directly or diagonally above the second feature, or may simply indicate that the first feature is at a higher level than the second feature. A first feature being "under," "below," and "beneath" a second feature may be directly under or obliquely under the first feature, or may simply mean that the first feature is at a lesser elevation than the second feature.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (10)
1. A method for real-name participation in a blockchain, comprising:
the participating node reads a user certificate image and user certificate information signed by a private key of a public security bureau from a certificate chip of an application user through authorization equipment, and acquires an authentication video recorded by the application user, wherein the authentication video comprises: the living body user and the video recording time are obtained, the authentication video is subjected to Hash calculation, a corresponding Hash value is obtained, and the Hash value is sent to a timestamp server, wherein the participating node is a node which is added into the block chain for the first time;
the timestamp server records the receiving time of the hash value, applies a private key of the timestamp server to sign the hash value and the receiving time and sends the signed hash value and the receiving time to the participating node;
the participating node calculates the time difference between the video recording time and the receiving time, and if the time difference is found to meet a preset time range, the participating node applies a private key of the application user to sign an authentication broadcast message and then sends the authentication broadcast message to a block chain network, wherein the authentication broadcast message comprises the authentication broadcast message; the hash value and the receiving time signed by the private key of the timestamp server, the public key and the basic user information of the application user, the user certificate image and the user certificate information signed by the private key of the public security bureau and the authentication video;
the mining node applies the public key of the application user to carry out signature verification on the received authentication broadcast message, verifies whether the hash value is matched with the authentication video after the verification is passed, if the correct matching is obtained, verifies whether the user certificate image is matched with the living body user, if the correct matching is obtained, verifies whether the user certificate information is matched with the user basic information, if the correct matching is obtained, the time difference between the video recording time and the receiving time is calculated, if the time difference meets the preset time range after the comparison is obtained, the real-name authentication of the application user is determined to pass, and the authentication success message is written into a block and is broadcasted to the block chain network;
and the mining node judges whether a broadcast message which is sent by other mining nodes and indicates that the block is invalid is received or not within preset time, if the broadcast message which is not received is known, the block is broadcasted to the block chain network to be effective, and the block is written into a block chain account book.
2. The method of claim 1, further comprising:
if the mining nodes know that the invalid broadcast message is received, judging whether the number of the mining nodes sending the invalid broadcast message exceeds a preset threshold value or not;
and if the mining node learns that the number is smaller than the preset threshold value, the mining node broadcasts the block to the block chain network to be effective, writes the block into a block chain account book, and broadcasts the block to the block chain network to be invalid if the mining node learns that the number is larger than or equal to the preset threshold value.
3. The method of claim 1, wherein the video recording time comprises:
displaying a time electronic clock image of the current specific time;
or,
the live user reads the current specific moment.
4. The method of claim 1, wherein the user credential information comprises: certificate number and user certificate name; the user basic information includes: a user identification and a user name;
the verifying whether the user certificate information is matched with the user basic information comprises:
verifying whether the certificate number is the same as the user identification, and verifying whether the user certificate name is the same as the user name.
5. The method of any of claims 1-4, wherein the authenticating video further comprises: the live user reads a preset voice segment for video authentication,
before the determining that the real-name authentication of the application user passes, the method further comprises:
the mining node detects the lip language of the living user to obtain lip language content, and compares the lip language content with the text content of the voice fragment;
and if the mining node learns that the lip language content is consistent with the text content of the voice fragment, determining that the real-name authentication of the application user passes.
6. A blockchain real name participation system, comprising: a participating node, a timestamp server and a mining node, wherein the participating node is a node which is added into the block chain for the first time,
the participating node is used for reading a user certificate image and user certificate information which are signed by a private key of a public security bureau from a certificate chip of an application user through authorization equipment, and acquiring an authentication video recorded by the application user, wherein the authentication video comprises: the live body user and the video recording time are used, hash calculation is carried out on the authentication video to obtain a corresponding hash value, and the hash value is sent to the timestamp server;
the timestamp server is used for recording the receiving time of the hash value, applying a private key of the timestamp server to sign the hash value and the receiving time and sending the signed hash value and the receiving time to the participating node;
the participating node is used for calculating the time difference between the video recording time and the receiving time, and if the time difference is found to meet a preset time range, applying a private key of the application user to sign an authentication broadcast message and then sending the authentication broadcast message to a block chain network, wherein the authentication broadcast message comprises the authentication broadcast message; the hash value and the receiving time signed by the private key of the timestamp server, the public key and the basic user information of the application user, the user certificate image and the user certificate information signed by the private key of the public security bureau and the authentication video;
the mining node is used for performing signature verification on the received authentication broadcast message by using the public key of the application user, verifying whether the hash value is matched with the authentication video after the verification is passed, verifying whether the user certificate image is matched with the living user if correct matching is obtained, verifying whether the user certificate information is matched with the user basic information if correct matching is obtained, calculating the time difference between the video recording time and the receiving time if correct matching is obtained, determining that the real-name authentication of the application user passes if the time difference meets a preset time range after the comparison is obtained, writing the authentication success message into a block, and broadcasting the block chain network;
and the mining node is used for judging whether a broadcast message which is sent by other mining nodes and indicates that the block is invalid is received within preset time, if the broadcast message which is sent by other mining nodes and indicates that the invalid broadcast message is not received, the block is broadcasted to the block chain network to be effective, and the block is written into a block chain account book.
7. The system of claim 6, wherein the mining node is further configured to:
if the fact that the invalid broadcast message is received is known, whether the number of the mining nodes sending the invalid broadcast message exceeds a preset threshold value or not is judged;
if the number is less than the preset threshold value, broadcasting the block to the block chain network to be effective, writing the block into a block chain account book, and if the number is greater than or equal to the preset threshold value, broadcasting the block to the block chain network to be ineffective.
8. The system of claim 6, wherein the video recording time comprises:
displaying a time electronic clock image of the current specific time;
or,
the live user reads the current specific moment.
9. A computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the blockchain real name participation method of any one of claims 1 to 5 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the blockchain real-name participation method according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810692342.2A CN108881253B (en) | 2018-06-29 | 2018-06-29 | Block chain real name participation method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810692342.2A CN108881253B (en) | 2018-06-29 | 2018-06-29 | Block chain real name participation method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108881253A CN108881253A (en) | 2018-11-23 |
CN108881253B true CN108881253B (en) | 2020-11-06 |
Family
ID=64296780
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810692342.2A Expired - Fee Related CN108881253B (en) | 2018-06-29 | 2018-06-29 | Block chain real name participation method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108881253B (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109194481B (en) * | 2018-07-24 | 2021-07-27 | 中国联合网络通信集团有限公司 | Blockchain real-name authentication method, device, equipment and storage medium |
CN111294323B (en) * | 2018-12-10 | 2022-01-18 | 成都高新信息技术研究院 | Decentralized mobile subscriber identification method and system |
CN110380847B (en) * | 2019-07-01 | 2021-11-19 | 创新先进技术有限公司 | Block chain consensus method and device |
CN111108526B (en) * | 2019-09-02 | 2024-04-12 | 创新先进技术有限公司 | Managing a blockchain-based centralized ledger system |
CN111837359B (en) | 2019-09-02 | 2023-08-04 | 创新先进技术有限公司 | Managing a blockchain-based centralized ledger system |
CN111325581B (en) * | 2020-02-27 | 2021-08-31 | 腾讯科技(深圳)有限公司 | Data processing method and device, electronic equipment and computer readable storage medium |
EP3837657B1 (en) | 2020-04-22 | 2022-12-07 | Alipay (Hangzhou) Information Technology Co., Ltd. | Managing transaction requests in ledger systems |
WO2020143856A2 (en) | 2020-04-22 | 2020-07-16 | Alipay (Hangzhou) Information Technology Co., Ltd. | Managing transaction requests in ledger systems |
EP3841549B1 (en) | 2020-04-22 | 2022-10-26 | Alipay (Hangzhou) Information Technology Co., Ltd. | Managing transaction requests in ledger systems |
CN111586059B (en) * | 2020-05-09 | 2021-04-16 | 杭州安存网络科技有限公司 | Block chain machine, block chain data access authentication method and computer readable storage medium |
CN111885073B (en) * | 2020-07-29 | 2022-06-10 | 中国联合网络通信集团有限公司 | Vehicle granting method and server |
CN112637298B (en) * | 2020-12-15 | 2022-03-04 | 中国联合网络通信集团有限公司 | Authentication Methods and Member Nodes |
CN114334110B (en) * | 2021-12-28 | 2023-01-17 | 中国联合网络通信集团有限公司 | Reservation method, block chain system, electronic device and computer readable medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106411503A (en) * | 2016-11-28 | 2017-02-15 | 中国银行股份有限公司 | Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN107403303A (en) * | 2017-06-16 | 2017-11-28 | 兴业数字金融服务(上海)股份有限公司 | A kind of signature method for the electronic contract system that card is deposited based on block chain |
CN107580196A (en) * | 2017-07-28 | 2018-01-12 | 国创科视科技股份有限公司 | A kind of video data shared system and method |
CN107682378A (en) * | 2017-11-22 | 2018-02-09 | 国民认证科技(北京)有限公司 | A kind of real name identification method and system based on block chain |
CN107784604A (en) * | 2017-10-28 | 2018-03-09 | 北京安妮全版权科技发展有限公司 | Copyright deposits card method, apparatus, storage medium and electronic equipment |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060005031A1 (en) * | 2004-06-15 | 2006-01-05 | Apostolopoulos John G | Methods and systems for utilizing a single cryptographic integrity check to generate multiple cryptographic integrity check values for components of transcodable content |
US10326825B2 (en) * | 2013-03-15 | 2019-06-18 | Gadget Software, Inc. | Apparatus for single workflow for multi-platform mobile application creation and delivery |
-
2018
- 2018-06-29 CN CN201810692342.2A patent/CN108881253B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN106411503A (en) * | 2016-11-28 | 2017-02-15 | 中国银行股份有限公司 | Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode |
CN107403303A (en) * | 2017-06-16 | 2017-11-28 | 兴业数字金融服务(上海)股份有限公司 | A kind of signature method for the electronic contract system that card is deposited based on block chain |
CN107580196A (en) * | 2017-07-28 | 2018-01-12 | 国创科视科技股份有限公司 | A kind of video data shared system and method |
CN107784604A (en) * | 2017-10-28 | 2018-03-09 | 北京安妮全版权科技发展有限公司 | Copyright deposits card method, apparatus, storage medium and electronic equipment |
CN107682378A (en) * | 2017-11-22 | 2018-02-09 | 国民认证科技(北京)有限公司 | A kind of real name identification method and system based on block chain |
Non-Patent Citations (1)
Title |
---|
视频版权自动认证系统的思考与设计;李吉广;《采集与制作》;20171231;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN108881253A (en) | 2018-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108881253B (en) | Block chain real name participation method and system | |
CN108876374B (en) | Block chain network identity document authentication method and system | |
US11082221B2 (en) | Methods and systems for creating and recovering accounts using dynamic passwords | |
US10361849B2 (en) | Methods and systems of providing verification of the identity of a digital entity using a centralized or distributed ledger | |
US10797879B2 (en) | Methods and systems to facilitate authentication of a user | |
US10127378B2 (en) | Systems and methods for registering and acquiring E-credentials using proof-of-existence and digital seals | |
EP3343831B1 (en) | Identity authentication method and apparatus | |
CN108900507B (en) | Block chain real-name authentication method and system | |
CN103440444B (en) | The signing method of electronic contract | |
CN108880832B (en) | Block chain real-name authentication method and system | |
JPWO2007094165A1 (en) | Identification system and program, and identification method | |
CN108876375B (en) | Block chain real name participation method and system | |
US11444784B2 (en) | System and method for generation and verification of a subject's identity based on the subject's association with an organization | |
EP3485600B1 (en) | Method for providing secure digital signatures | |
CN106209730B (en) | Method and device for managing application identifier | |
EP3443501B1 (en) | Account access | |
CN110995661B (en) | Network card platform | |
CN112002436A (en) | Block chain-based medical question answering method, device and medium | |
CN106656955A (en) | Communication method and system and user terminal | |
Frederiksen | A holistic approach to enhanced security and privacy in digital health passports | |
CN114285662A (en) | Authentication method, device, equipment and storage medium | |
US20240129139A1 (en) | User authentication using two independent security elements | |
EP3035589A1 (en) | Security management system for authenticating a token by a service provider server | |
CN119071007A (en) | Login verification method, device, electronic device and computer-readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing Applicant after: IALLCHAIN Co.,Ltd. Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing. Applicant before: IALLCHAIN Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20201106 Termination date: 20210629 |